Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe
-
Size
93KB
-
MD5
a3978ed70339eebaaac5b70906b9c5b9
-
SHA1
309961e8445e6c8092a408b3bae546084dfc64e3
-
SHA256
9eeb1f39cd444e13a5805e420a57b2063c35ee7bb761e28394326079b6f4b268
-
SHA512
c794627b79e1497a76a7e8afcd71a98ae3b62b9717772c5cc166eb81fbb5d94babf41f19f7f5910292d8143608c61423730beccbf3e92d3ec1f530fd05b430e3
-
SSDEEP
1536:qztKNuX1AzbhWhZP/Vbhw4AoxLTY9P0dspK4uvkvVubIRlZQ74PSo8QiPRtRT+c:qwNuCbh8R4reTYF0kK47JRXnSobipP6c
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\VLyc8XRI0B2 a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\VLyc8XRI0B2.ico a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe File opened for modification C:\Windows\VLY.log a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe File created C:\Windows\msagent\VLyc8XRI0B2.exe a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe File created C:\Windows\msagent\VLyc8XRI0B2.lo a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5004 a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3978ed70339eebaaac5b70906b9c5b9_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4188,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD5fdcd2171ce57531cacdcdfb052f99593
SHA1de9870775f6eec4cc931710446b58823783af290
SHA2561e4c2b135bee5a40741fbeaa994019c3bf06b95149825345f54e23a77ab262ec
SHA512504c029ebda9168bfc39ac6ca64c15af072f0046a327543ab830268627520d0d1c560fe7415035771bfe59aed1adac5748e8f1dbaeae9e63ccb9e0aa1ebcec21